Home Edward J. Hawkins, II

Edward J. Hawkins, II

Designing a Secure Physical Environment for Your Network

The relatively short history of information technology (IT) and the lack of its secure implementation require that many new technologies be designed, implemented and installed in existing infrastructures.

Using the Layered Approach to Cybersecurity Protection

Using the layered approach to organizational cybersecurity has grown in importance, with security issues resulting from BYOD policies and IoT devices.

Security Fundamentals: Maintaining Network Availability

Availability is probably one of the more convoluted security goals in the CIA Triad. This is due to its position in terms of security.